Delegations will find attached the declassified version of the above document.

Size: px
Start display at page:

Download "Delegations will find attached the declassified version of the above document."

Transcription

1 Council of the European Union Brussels, 8 February 2017 (OR. en) 13203/1/16 REV 1 DCL 1 GENVAL 103 CYBER 112 DECLASSIFICATION of document: dated: 31 January 2017 new status: Subject: 13203/1/16 REV 1 RESTREINT UE/EU RESTRICTED Public Evaluation report on the 7th round of mutual evaluations "The practical implementation and operation of European policies on prevention and combating cybercrime" - Report on the Czech Republic Delegations will find attached the declassified version of the above document. The text of this document is identical to the previous version /1/16 REV 1 DCL 1 dm DG F 2C EN

2 Council of the European Union Brussels, 31 January 2017 (OR. en) 13203/1/16 REV 1 RESTREINT UE/EU RESTRICTED GENVAL 103 CYBER 112 REPORT Subject: Evaluation report on the 7th round of mutual evaluations "The practical implementation and operation of European policies on prevention and combating cybercrime" - Report on the Czech Republic 13203/1/16 REV 1 CN/ec 1 DGD2B RESTREINT UE/EU RESTRICTED EN

3 ANNEX Table of Contents 1. EXECUTIVE SUMMARY INTRODUCTION GENERAL MATTERS AND STRUCTURES National cyber-security strategy National priorities with regard to cybercrime Statistics on cybercrime Main trends leading to cybercrime Number of registered cases of cybercrime Domestic budget allocated to prevent and fight against cybercrime and support from EU funding Conclusions NATIONAL STRUCTURES Judiciary (prosecutions and courts) Internal structure Capacity for and obstacles to successful prosecution Law-enforcement authorities Other authorities/institutions/public-private partnership Cooperation and coordination at national level Legal or policy obligations Resources allocated to improve cooperation Conclusions LEGAL ASPECTS Substantive criminal law pertaining to cybercrime Council of Europe Convention on Cybercrime Description of national legislation A/ Council Framework Decision 2005/222/JHA on attacks against information systems and Directive 2013/40/EU on attacks against information systems B/ Directive 2011/93/EU on combating sexual abuse and sexual exploitation of children and child pornography C/ Online Card fraud D/ Other cybercrime phenomena Procedural issues Investigative Techniques Forensics and Encryption E-Evidence Protection of Human Rights/Fundamental Freedoms Jurisdiction Principles applied to the investigation of cybercrime Rules in case of conflicts of jurisdiction and referral to Eurojust Jurisdiction for acts of cybercrime committed in the 'cloud' Perception of Czech Republic with regard to legal framework to combat cybercrime Conclusions /1/16 REV 1 CN/ec 2

4 6. OPERATIONAL ASPECTS Cyber-attacks Nature of cyber-attacks Mechanism to respond to cyber-attacks Actions against child pornography and sexual abuse online Software databases identifying victims and measures to avoid re-victimisation Measures to address sexual exploitation/abuse online, sexting, cyber bulling Preventive actions against sex tourism, child pornographic performance and others Actors and measures countering websites containing or disseminating child pornography Online card fraud Online reporting Role of the private sector Other cybercrime phenomena Conclusions INTERNATIONAL COOPERATION Cooperation with EU agencies Formal requirements to cooperate with Europol/EC3, Eurojust, ENISA Assessment of the cooperation with Europol/EC3, Eurojust, ENISA Operational performance of JITs and cyber patrols Cooperation between the Czech authorities and Interpol Cooperation with third states Cooperation with the private sector Tools of international cooperation Mutual Legal Assistance Mutual recognition instruments Surrender/Extradition Conclusions TRAINING, AWARENESS-RAISING AND PREVENTION Specific training Awareness-raising Prevention National legislation/policy and other measures Public Private Partnership (PPP) Conclusions FINAL REMARKS AND RECOMMENDATIONS Suggestions from the Czech Republic Recommendations Recommendations to Czech Republic Recommendations to the European Union, its institutions, and to other Member States Recommendations to Eurojust/Europol/ENISA Good practices in the Czech Republic Annex A: Programme for the on-site visit and persons interviewed/met Annex B: Persons interviewed/met Annex C: List of abbreviations/glossary of terms /1/16 REV 1 CN/ec 3

5 1. EXECUTIVE SUMMARY The mission to the Czech Republic was very well organised in an efficient and cordial way by the national authorities. The evaluation team was able to meet representatives of the various authorities involved in the field of preventing and fighting cybercrime, including the Ministry of the Interior, the Ministry of Justice, the Unit for Combating Organised Crime of the Criminal Police and Investigation Service, Analytics and Cybercrime Department of the Regional Directorate of the Police of the Southern Moravian Region, Institute of Criminalistics Prague, Supreme Public Prosecutor's Office, National Security Authority/National Cyber Security Centre and representatives of academia and non-governmental organisations. During the visit, the representatives of the Ministry of the Interior in charge of the evaluation visit did everything to provide the evaluation team with clarifications on the legal and operational aspects of detecting, preventing and combating cybercrime, international judicial cooperation in criminal matters and cooperation with EU agencies, cyber security strategy, training, etc. The meetings helped the evaluation team gain a better understanding of the responses provided in the questionnaire and of the national system in the Czech Republic. The evaluation team on its mission to the Czech Republic also recognised the essential effort made by the many speakers who gave presentations highlighting organisational matters, human resources issues, workflow in investigations, the main trends in the field of cybercrime, prevention and awareness raising, training, international police and judicial cooperation especially in relation to Europol, Interpol and Eurojust legislation (including recent changes), the criminal justice system, cooperation among national institutions, academia, industry and non-governmental organisations, national strategies to combat organised and serious crime, and strategies on national security and national cyber security /1/16 REV 1 CN/ec 4

6 A judge was present for the first day of the visit, when the team met representatives from the police. The team appreciates the effort of CZ authorities to include judges in the evaluation visit, although their presence would have produced more added value had it been announced before the visit or had it been arranged separately ad hoc. The various authorities, bodies and organisations have different competences and responsibilities but the 'fight against cybercrime' is seen to be a common goal. In February 2015, the Czech Republic adopted the second National Cyber Security Strategy for ; this was followed by the Action Plan, adopted in May The Strategy includes some fundamental principles, such as protection of fundamental human rights, a comprehensive approach to cyber security based on principles of subsidiarity and cooperation, trust-building and cooperation between the public and private sectors and civil society, and cyber-security capacitybuilding. The Strategy also identifies the challenges and main goals in the field of national cyber security. The national legislation complies with the Council of Europe Convention on Cybercrime and with Directive 2013/40/EU on attacks against information systems. Directive 2011/93/EU of 13 December 2011 on combating the sexual abuse and sexual exploitation of children and child pornography has also been transposed into national law. A more coordinated approach on statistics at national level would be beneficial in terms of giving an accurate picture of the types of cybercrime, as reflected in the different stages of investigation, prosecution and trial, especially for offences relating to the sexual exploitation of children /1/16 REV 1 CN/ec 5

7 Regarding the national structure of LEAs, there are 14 police units with nation-wide competences. From 1 April 2016 a reorganisation of the police will be in place as regards cybercrime competence, allowing the Unit for Combating Organised Crime to investigate the most serious cybercrime offences as a specialised body at central level. The Organised Crime Unit will include the Cybercrime Department and the Department of Cybercrime Investigation and Analysis. Competence for cybercrime offences will then be shared between the Unit for Combating Organised Crime and Investigation Service and the territorial units. As to prosecution, a network of prosecutors specialising in cybercrime was recently established formally at national level; it includes 17 prosecutors. During the meeting with representatives of the General Prosecutor's Office, a case of trafficking of human beings and child sexual exploitation, which involved the creation of a Joint Investigation Team (SE, ES and CZ), was presented to the evaluation team. The National Cyber Security Centre was established recently. Its primary task is identification of critical information infrastructure. In addition, it performs security audits, exercises, international cooperation and policy work. It also offers legal and policy support for the governmental CERT's (GovCERT.CZ) activity and technical cooperation with LEAs in the field of cybercrime (it can provide technical help in criminal investigations). The National Cyber Security Centre has an important role in education and awareness-raising concerning cyber-attacks and cybercrime. Its basic services may be summarised as follows: reactive, proactive and analytical. Its main roles are handling incidents, testing development and security, and analysis of networks. The Czech Cyber Security Incident Response Team (CSIRT.CZ) fulfils the role of a national CERT and coordinates responses to security threats in computer networks and organises cooperation with internet service providers. It offers help to other private companies in establishing their own CSIRTs. The Czech CSIRT runs the PROKI project, designed to predict and protect against cyberincidents /1/16 REV 1 CN/ec 6

8 Regarding the field of cyber security it should be mentioned that at national level there are already 24 CSIRT teams and one more candidate team. Actions aimed at prevention and public awareness of cybercrime are carried out by a number of authorities within the Czech Republic. These include the National Cyber Security Centre, the lawenforcement authorities and the private sector, academia and non-governmental organisations. These sectors play active roles in prevention and awareness campaigns throughout the country. An important and innovative role is played by the Institute of Computer Science at Masaryk University Brno, which has developed a special tool, KYPO (Cyber Exercise and Research Platform). During the visit the evaluation team witnessed a very impressive simulation on this tool. The Centre offers training for judicial and police academies, investigators and public prosecutors. It organises summer schools and PhD and master's degrees in cyber-security. Funding is provided by the governmental security research instrument under the Ministry of Interior. The National Security Authority, as cyber security national authority, is part of the project steering committee /1/16 REV 1 CN/ec 7

9 2. INTRODUCTION Following the adoption of Joint Action 97/827/JHA of 5 December , a mechanism was established for evaluating the application and implementation at national level of international undertakings in the fight against organised crime. In line with Article 2 of the Joint Action, the Working Party on General Matters including Evaluations (GENVAL) decided on 3 October 2013 that the seventh round of mutual evaluations should be devoted to the practical implementation and operation of European policies on prevention and combating cybercrime. The choice of cybercrime as the subject for the seventh Mutual Evaluation round was welcomed by Member States. However, due to the broad range of offences covered by the term cybercrime, it was agreed that the evaluation would focus on those offences which Member States felt warranted particular attention. The evaluation therefore covers three specific areas: cyber-attacks, child sexual abuse/pornography online and online card fraud; it should provide a comprehensive examination of the legal and operational aspects of tackling cybercrime, cross-border cooperation and cooperation with relevant EU agencies. Directive 2011/93/EU on combating the sexual abuse and sexual exploitation of children and child pornography 2 (transposition date 18 December 2013) and Directive 2013/40/EU 3 on attacks against information systems (transposition date 4 September 2015) are particularly relevant in this context Joint Action of 5 December 1997 (97/827/JHA), OJ L 344, pp OJ L 335, , p. 1. OJ L 218, , p /1/16 REV 1 CN/ec 8

10 Moreover, the Council conclusions on the EU Cybersecurity Strategy of June reiterate the objective of ratification of the Council of Europe Convention on Cybercrime (the Budapest Convention) 5 of 23 November 2001 as soon as possible and emphasise in their preamble that 'the EU does not call for the creation of new international legal instruments for cyber issues'. This Convention is supplemented by a Protocol on xenophobia and racism committed through computer systems. 6 Experience from past evaluations shows that Member States will be in different positions regarding implementation of relevant legal instruments, and the current process of evaluation could also provide useful input to Member States which may not have implemented all aspects of the various instruments. Nonetheless, the evaluation aims to be broad and interdisciplinary and not focus on the implementation of various instruments relating to fighting cybercrime alone, but rather on operational aspects in the Member States. Therefore, apart from cooperation with prosecution services, this will also encompass how police authorities cooperate with Eurojust, ENISA and Europol/EC3 and how feedback from the actors concerned is channelled to the appropriate police and social services. The evaluation focuses on implementing national policies with regard to suppression of cyber-attacks and fraud as well as child pornography. The evaluation also covers operational practices in the Member States with regard to international cooperation and the support offered to victims of cybercrime /13 POLGEN 138 JAI 612 TELECOM 194 PROCIV 88 CSC 69 CIS 14 RELEX 633 JAIEX 55 RECH 338 COMPET 554 IND 204 COTER 85 ENFOPOL 232 DROIPEN 87 CYBER 15 COPS 276 POLMIL 39 COSI 93 DATAPROTECT 94. CETS No 185; opened for signature on 23 November 2001, entered into force on 1 July CETS No 189; opened for signature on 28 January2003, entered into force on 1 March /1/16 REV 1 CN/ec 9

11 The order of visits to the Member States was adopted by GENVAL on 1 April The Czech Republic was the (eighteenth) Member State to be evaluated during this round of evaluations. In accordance with Article 3 of the Joint Action, a list of experts in the evaluations to be carried out has been drawn up by the Presidency. Member States have nominated experts with substantial practical knowledge in the field pursuant to a written request on 28 January 2014 to delegations made by the Chairman of GENVAL. The evaluation teams consist of three national experts, supported by two staff from the General Secretariat of the Council and observers. For the seventh round of mutual evaluations, GENVAL agreed with the proposal from the Presidency that the European Commission, Eurojust, ENISA and Europol/EC3 should be invited as observers. The experts charged with undertaking the evaluation of the Czech Republic were Mr Anton Toni Klančnik (Slovenia), Mr Zsolt Szabolcsi (Hungary) and Ms Nienke Ross (Netherlands). One observer was also present: Ms Anna Danieli (Eurojust), together with Ms Carmen Necula from the General Secretariat of the Council. This report was prepared by the expert team with the assistance of the General Secretariat of the Council, based on findings arising from the evaluation visit that took place in the Czech Republic between 8 and 12 February, and on the Czech Republic's detailed replies to the evaluation questionnaire, together with their detailed answers to follow-up questions /1/16 REV 1 CN/ec 10

12 3. GENERAL MATTERS AND STRUCTURES 3.1. National cyber-security strategy On 16 February 2015, the Government of the Czech Republic adopted the new National Cyber Security Strategy of the Czech Republic for the period 2015 to 2020 (hereinafter 'Cyber Security Strategy'), which was submitted by the National Security Authority (NBÚ), the competent national authority for cyber security issues. The Cyber Security Strategy builds upon and develops its predecessor, the Strategy of the Czech Republic in the Field of Cyber-Security for It was followed by the Action Plan adopted by the Government on 25 th May The Action Plan specifies tasks, competences and the time-frame for meeting the objectives set out in the Cyber Security Strategy, including combating cybercrime. The unavoidable dependence of society on information technology and the associated increase in cybercrime are conceived in the Cyber Security Strategy as being among the main challenges. One of the principles which the Cyber Security Strategy builds upon, therefore, is the need to develop capacity to ensure cyber security, which also involves structures and processes in the area of combating cybercrime. Another of its priorities is to strengthen cooperation between lawenforcement authorities and other relevant bodies. As part of the annual Report on the State of Cyber Security in the Czech Republic, a report on the state of the implementation of the Action Plan is envisaged, as an annex. The report will inform the government and the general public as to the effectiveness of measures adopted and the implementation of tasks defined by the Strategy /1/16 REV 1 CN/ec 11

13 The Cyber Security Strategy and the Action Plan are available in English on websites of the National Security Authority (NBÚ): Promoting the development of the capabilities of the Czech Republic's police to investigate and prosecute cybercrime is the subject of a separate chapter of the Cyber Security Strategy, reflected in the Action Plan by the following tasks: to reinforce the personnel of individual cybercrime police departments; to modernise technological equipment of specialised police departments; to develop cooperation with foreign counterparts; to provide professional education and training to police specialists including language training. The fight against cybercrime is considered in greater detail in the Conception of the Development of Capabilities of the Police of the Czech Republic to Investigate Cybercrime, which was drafted by the Police Presidium of the Czech Republic and adopted by the National Security Council in October This material was created in the context of Government Resolution No 598 of 10 August 2011, and its purpose is to formulate measures to develop suitable long-term conditions for the work of the police force in the detection and prosecution of cybercrime on the territory of the Czech Republic based on the analysis of the current situation. It includes organisational and systemic measures including increasing the personnel of police departments linked to the investigation of cybercrime. The national authorities mentioned as good practice the establishment and development of cybercrime departments staffed by police specialists. What is important is continuous updating of legislation and prevention programmes. Without close cooperation between the government and the private and university sectors, the situation would be difficult /1/16 REV 1 CN/ec 12

14 Another important need is to provide the personal, technical and educational support to experts and professional staff at the Institute of Criminalistics Prague and departments of forensic technique and expertise which, based on the requirements of law-enforcement authorities, provide expert assessments and examinations in the context of cybercrime. More information on the National Cyber Security Strategy was obtained during the evaluation visit from representatives of the National Cyber-Security Centre. They underlined that the strategy contains a definition of cyber security which ensure legal certainty and is very useful in practice in order to identify all cyber-security-related issues. The action plan accompanying the strategy contains a large number of action items (141) and designates 17 responsible entities because in the national authorities view the strategy should not remain merely 'on paper'. Every year the institutions responsible must present an implementation report to the government, which supervises the implementation of the strategy. The NSA plays a coordinating role in the field of cyber security. It operates the National Cyber Security Centre in Brno, which carries out activities on behalf of the governmental CERT and acts as coordinator for immediate response to cyber-incidents. Police liaison officers are also part of this structure. The NSA can also act as 'expert' on cybersecurity issues for the police. It was one of the main drivers of the National Security Strategy and its Action Plan, adopted in May Its responsibilities include the defining of agendas for policy and strategy by means of a dedicated Strategy and Policy Unit, providing legal and strategic support to GovCERT.cz. It also engages in dialogue with the other EU Member States. CSIRT.CZ is active in the region of Prague in the field of prevention and incident handling, especially where repeated or particularly serious. Its role derives from the Act on Cyber Security and a public contract with NSA /1/16 REV 1 CN/ec 13

15 The CERT/CSIRT teams (so far 24 teams have been established, and two more were being set up at the time the visit took place), whether national, governmental, set up by universities, providers, banks, are a significant help in combating cybercrime. The Team observed that teams established in the private sector under the terms of the Cyber Security Act report to CSIRT. Reference was also made to the PROKI Project, launched by the Ministry of the Interior. The project was initiated because of the need to be able to prioritise within the massive amount of information processed on cyber-security issues. From the collection of security incidents, a report should be sent to inform the operators (say once a week), and at the same time this information should be stored in a system for analysis. As of February 2016, it was reported that the system is up and running. The Team also heard about how CZ responded, in 2013, to a week of 'waves' of DDoS cyberattacks against popular news and other media (on Monday), a search engine (on Tuesday), web servers of several banks (Wednesday) and web servers of two mobile operators. The RETN network was the source of the attacks, which luckily were weak and only caused problems in end-user networks. The solution found was to block traffic from abroad: a 'club' of operators as a local peering centre was established in NIX.CZ. Within NIX the project 'FENIX' was initiated, bringing together the biggest local telecommunications companies, hosting companies and service providers. Its members operate trusted networks under strict conditions and can, if necessary, filter out foreign traffic. Those belonging to FENIX contractually prohibit customers from engaging in illegal activities. In the event of a massive attack the targeted operator can shut down connections with attackers and communicate only within the set of FENIX members /1/16 REV 1 CN/ec 14

16 3.2. National priorities with regard to cybercrime National priorities on cybercrime are directly derived from the Cyber Security Strategy - the section 'Main Objectives' (pp ). These priorities are linked to strategic objectives and operational action plans drawn up for cybercrime as among the priorities of the EU. Those identified were as follows: active international cooperation; cooperation with the private sector; research and development / consumer trust; education, awareness-raising and information society development; support for capabilities of the Czech police to investigate and prosecute cybercrime (a separate policy document was produced containing a number of individual points to improve the activities of the police of the Czech Republic in the area of cybercrime) Statistics on cybercrime Main trends leading to cybercrime The largest proportion of innovations in the field of security threats is represented by mobile platforms. Ransomware is increasing on mobile devices, through virtual currencies like Bitcoin. Attacks using advanced techniques have new and more effective ways to identify and bypass sandboxes and other local security measures. Attacks on social platforms are more aggressive and are aimed at consumers' finance and personal information, as well as entrepreneurs' intellectual property and trade secrets /1/16 REV 1 CN/ec 15

17 Mobile malware is becoming the driving force in terms of both technical innovation and numbers of attacks. New PC malware growth is almost non-existent, while new forms in the Android environment have grown by 33%. Virtual currencies encourage the spread of malicious ransomware worldwide. Virtual currencies will provide cybercriminals with the unregulated and anonymous payment infrastructure necessary for obtaining money from their victims. Currencies like Bitcoin allow the spread of a new generation of ransomware, such as Cryptolocker. In the world of cybercrime, advanced attack techniques, such as sandbox-aware attacks, are available. Other technologies include so-called 'return-oriented' attacks, where legitimate applications start to behave in a harmful way, for example, 'self-deleting' malware can cover its trail after reaching its real goal, and advanced attacks also concentrate on specialised industrial control systems focused on public and private infrastructure. Attacks on social networks are ubiquitous and focused on obtaining passwords or user information, location or business activities. This information can be used to target advertisements or to commit virtual or real crimes. New attacks on PCs and servers are focused on weak points above and below the operating system. New attacks on PCs utilise vulnerabilities in Web applications in HTML5. Attacks on mobile platforms that will break the 'sandbox' browsers and give attackers direct access to devices and services are expected. Criminals are increasingly focusing on vulnerabilities of operating systems, as well as BIOS. Deploying enterprise applications based on the 'cloud' creates a space for new attacks. Cybercriminals are exploring ways to use the ubiquitous hypervisors in all data centres, multi-access to users, communication infrastructure of implicit cloud services and infrastructure management, which is used in the provision and monitoring of cloud services on a large scale /1/16 REV 1 CN/ec 16

18 The main trends in the field of cybercrime in the Czech Republic are as follows: Criminal Offences Trends Fraud - failure to deliver ordered goods individual, or via whole fraudulent e- shops - failure to pay for delivered goods (predominantly to customers abroad) - organised fraudulent offers to sell, especially, cars from abroad - 'Nigerian letters' (Scam 419) - fraud through spurious s, for example, of the legitimate EMKEI.CZ service Criminal activities in the field of - dissemination of pornography, child pornography pornography - production and other handling of child pornography - child abuse for the production of pornography - participation in a pornographic performance - establishing of illicit contacts with a child Thefts from accounts - by using malware - by phishing - by abuse of a means of payment Unauthorised gain, falsification and - payment cards, electronic money alteration of a payment instrument Legalisation of proceeds of crime (also - so-called 'work' transfers of stolen as a result of negligence) Hacking Dangerous threats, spreading of alarming messages, dangerous stalking Criminal activities in the area of extremism Criminal activities in the area of copyright protection Forgery and alteration of public documents, official stamps Slander money, disguising its origin - attacks on computer and information systems, accounts etc., and social network accounts intrusion into privacy, obtaining, their damage and/or destroying information + possible related criminal activity - phishing - DDoS and similar attacks - using electronic communications - defamation of nation, race, ethnic or other group of people, incitement to hatred, establishment and promotion of movements aimed at suppressing human rights and freedoms - copying, dissemination, unauthorised use, sharing copyrighted content - computer technology that allows and significantly facilitates forgery and alteration is used - products are distributed via the internet 13203/1/16 REV 1 CN/ec 17

19 Cybercrime in the Czech Republic is currently defined as a crime committed in the environment of information and communication technologies including computer networks; the object of an attack is the very area of information and communication technology. There are also cases of criminal activities with a significant use of information and communication technologies as an important means for their commission. It is thus a broader definition of cybercrime than the definition introduced in this questionnaire. For that reason, the Czech Republic feels the need to mention a new phenomenon in the field of cybercrime, i.e. trafficking in drugs and other illicit commodities, both on the open internet and on the dark net. This criminal activity is not directly addressed in this questionnaire but it is gaining in importance. Not only in the field of the conventional drugs trade, but particularly in the retail of new psychoactive substances, drug precursors, chemicals, medicines and anabolic steroids on the internet, we can clearly observe an increase in both the emergence of specialised e-shops and a variety of advertising offers in recent years. Although at present its share in the total volume of crime and also specifically in drugrelated crime is small, it shows clear growth. Given the difficulty of detection and investigation of this type of crime (personnel, technical equipment, complicated legislation, etc.), it is necessary to pay far more attention to this area of crime from the perspective of the police in the future. Crime statistics for drug offers and trafficking on the internet are not yet separately followed in the system. For the police of the Czech Republic, this area deserves a higher level of support than in the past, since problems are also reflected in procedural issues, particularly in obtaining data from providers of hosting websites operating abroad. As an example, we can mention requirements towards the US, particularly relating to the services of Google Inc., where repeated requests to supplement information on the basis of international legal assistance can take over six months to be processed. A similar situation is also evident in the area of illegal trade in other commodities - weapons, explosives, explosive precursors, etc. As regards statistical indicators, we can present statistics on crimes committed in the environment of information technologies and the internet from the ESSK system (see below). However, offences only partly committed in this environment are not included /1/16 REV 1 CN/ec 18

20 Cybercrime offences in 2014 (as percentages): Fraud 57% Extremist manifestations 1% Vice crime 6% Damage and abuse of media records 12% Infringement to copyright to databases, forgery 6% Unlawful possesion of payment means 2% Dangerous pursuing 1% Dangerous threatening 1% Extortion 1% Forgery and changes to official documents 1% Other criminal activity 13% 13203/1/16 REV 1 CN/ec 19

21 The total (approximate) capacity of messages exchanged through the Department of International Police Cooperation (OMPS) in the period from 2012 to Q3/2015; for specific categories see question 1.6.: Q Number of registered cases of cybercrime Statistical data are provided by the police of the Czech Republic via: Statistical Crime Recording System (hereinafter 'ESSK') this system includes a form with the characteristics of a criminal offence, including indictments and resulting substantive decisions (by police, public prosecutor and court) and a form for statistical reporting of events which are not criminal offences. Evidence of Criminal Procedures (hereinafter 'ETR') a complex information system covering all areas of crime, misdemeanour and other police proceedings including objects, entities, goods and forms; it makes it possible to provide various statistical outputs as well as adding specifics of individual cases 'monitored event information crime'. The majority of criminal complaints originate from individual citizens, not from larger entities such as companies. Statistical data are also collected in the system of Public Prosecutor's Offices and courts. Court statistics are collected separately from the statistics of law-enforcement authorities (however, the substantive decisions are reflected as described above) /1/16 REV 1 CN/ec 20

22 Official national statistics, as mentioned above, are maintained by the law-enforcement sector only (there is no outsourcing, even partial, nor any other similar mechanism). There are also independent studies by private consulting companies that we are aware of; however, these are not taken into account in the official statistics of the law-enforcement authorities and often differ significantly. Crimes in cyberspace, in terms of monitoring requirements under Directive 2013/40/EC and the requirements of the Joint Action 97/827/JHA of 5 December 1997, may be divided as follows: a) crimes against the confidentiality, integrity and use of computer data and a system - sanctioned directly in Sections 230 to 232 of the Criminal Code (see attached statistics); b) crimes of production, distribution and other handling of child pornography in cyberspace; c) other criminal offences committed via the internet (internet fraud), violations of intellectual property rights (piracy). Overview of statistics on the exchange of information via the Department of International Police Cooperation in the period of 2013 September 2015: received from abroad via Interpol and Europol channels, or from national bodies Bureau of Criminal Police and Investigation Service (hereinafter 'ÚSKPV') or other Criminal Police and Investigation Service (hereinafter 'SKPV') bodies sent mainly forwarded to ÚSKPV, or lower units in a follow-up communication received sent received sent received sent received sent child pornography and abuse computer crime CAM notifications fraud and embezzlement /1/16 REV 1 CN/ec 21

23 CAM notifications only report Czech IP addresses and boxes, which have sent, received or stored illicit multimedia files containing child abuse and child pornography. They include the date, precise time, and Czech IP address, the number of illicit files, user registration data (if available) and offer to request evidence. This function, however, is not yet automated. As for other statistics (crimes under points (b) and (c)), their presentation is problematic. Out of the total data, it is not possible to separate / identify offences committed via the internet and other communication technologies (such as crimes in cyberspace), because such distinctions are absent from the statistical sheet. The ESSK police system is currently under development and concrete proposals are being considered to make possible more accurate reporting and monitoring of criminal activities in cyberspace. From 2016 onwards, it will, therefore, be possible to add a relevant distinctive character in the statistical sheet to specify whether a particular offence involved use of the internet (a monitored circumstance of the criminal offence). During the evaluation visit the national authorities informed the evaluation team that cyberincidents had been rising very steeply in recent years. They mentioned reasons such as the great ease of cross-border activity and that sometimes people do not even know that they have become victims of cybercrime. In recent years, thanks to national authorities' efforts, people have become more aware, and reporting is also rising. Victims can easily report illegal activities; since August 2012 hotlines managed by experts have been in place, where many reports of suspicions of cybercrime are received. There is also a pro-active approach on the part of the national authorities to detecting cybercrime incidents, in order to reduce the number of cases. However, there is a rise in fraud, the most usual type being the creation of e-shops which offer goods for low prices and ask people to pay in advance. Another phenomenon is internet banking attacks; the national authorities also mentioned that some phishing pages are very sophisticated and can mislead people /1/16 REV 1 CN/ec 22

24 The other main trends mentioned were: attacks through social networks to collect data, identity theft and cyberbullying, blackmail, extortion and malware. Concerning statistics, it should be mentioned that in the Czech Republic two parallel systems are operated by the police, namely ESSK and ETR. Prosecution offices and courts also collect statistics. However, data regarding child sexual exploitation material and sexual abuse of children are not kept separately, but included in a larger category of offences, called 'vice crimes' along with other offences including trafficking of human beings, prostitution, etc. Statistical data are collected by the Czech police via the ESSK and ETR. As mentioned in the questionnaire, the presentation of statistics on the crimes of production, distribution and other handling of child pornography in cyberspace and other criminal offences committed via the internet and violations of intellectual property rights is problematic. It is not possible to separate or identify offences committed via the internet and other communication technologies because such a distinction is absent from the statistical sheet Domestic budget allocated to prevent and fight against cybercrime and support from EU funding There are no specific budget resources allocated to preventing and combating cybercrime. However, the resources allocated are included in the budgets linked to the fulfilment of the government's priorities and the required resources for the police of the Czech Republic. It is planned that EU funding to combat cybercrime be used. A request for funding from the Internal Security Fund police section (ISF P) for the development of the new cyber unit has recently been submitted (approximately CZK 167 million). Therefore, over the coming years, approximately 195 systemised service positions should be created (within both national and regional units) /1/16 REV 1 CN/ec 23

25 3.5. Conclusions In February 2015 the Czech Republic adopted the second National Cyber Security Strategy, which builds on the main trends of the previous one. At national level there is continuity in preventing and combating cyber security incidents, as well as cybercrime, and this fact highlights current interest in this field. The Strategy is accompanied by the Action Plan, adopted immediately after the Strategy, in May 2015, which establishes many specific targets as well as the institutions responsible. CZ seems to have reached a high level in terms of cyber security prevention and response. Particularly interesting is that CZ was the object of DDoS cyber-attacks in March 2013 which prompted a reaction that led to the creation of a more structured approach in cyberdefence/cyber security. The CZ National Security Authority has just launched the project 'Digital Footprint' as a preventive tool for children. The main scenario concerns an incident or crime committed against a child, e.g. extortion for illicit pictures of a child, spreading personal data etc., and children have to investigate or discover what actually happened. As a more concrete storyline: young girls posted some sensitive pictures on social networks, and the detectives (children) had to search for relevant data and understand the situation so as to avoid becoming victims in reality. The concept is known as 'learning by doing'. The CZ National Security Authority performs prevention and awareness activities for its internal personnel and for public administration personnel, e.g. establishing and implementing security standards, making learning models for public administration (online courses, setting basic administration rules, public communication, basic cyberspace topics, socio-political topics for IT staff at embassies, etc.) /1/16 REV 1 CN/ec 24

26 Statistics are collected by LEAs, prosecution offices and courts. However, a more coordinated approach could be very useful for a clear picture of the dimensions and characteristics of cybercrime, especially for child sexual exploitation cases, which could be reflected in separately in data collected for statistical purposes. The statistics on information exchange relating to relevant cybercrime areas are quite difficult for the evaluation team to understand, especially as regards counting notifications named as 'child pornography and abuse notifications' and 'CAM notifications' as two different entities, while the content of both entities deals with the same matter. As the team understood it, the police statistical system is under development and the specific changes to be introduced should give adequate results even for different cybercrimes. This decision is welcomed and supported by the evaluation team. The national authorities do not allocate a specific budget line for preventing and fighting cybercrime. These activities are carried out using the ordinary budget of the LEAs. During the evaluation visit, the national authorities expressed the intention of making better use of EU funding for combating cybercrime. It is understood that the police are doing their best in prevention and combating cybercrime; on the other hand, the police are not the only stakeholders to be encouraged to receive a specific budget for preventing and combating cybercrime in various areas (cyber-attacks, cyber-fraud with payment cards, child sexual exploitation online) the government should also take further steps in raising awareness in the CZ community, professionals, institutions and NGOs, and should maintain a significant budget for the purpose, including projects run in close cooperation with various population groups and institutions /1/16 REV 1 CN/ec 25

27 4. NATIONAL STRUCTURES 4.1. Judiciary (prosecutions and courts) Internal structure A system of Public Prosecutor's Offices (prosecutors) and the courts (in competence of the Ministry of Justice), which also target cybercrime when taking over the results of the police investigation; effective and timely sanctions also have an impact on the prevention of cybercrime and on increasing legal awareness in this field; jurisprudence is gradually being developed by decisions that can support a proper and accurate interpretation of existing laws or help to generate the necessary impetus for amendments of the law in the future. Their injunction, permitting and supervisory function is also very significant, in cases of serious violations of rights and freedoms of citizens or breaches of confidentiality, and also in gathering evidence linked to cybercrime. Criminal offences in the area of cybercrime are dealt with by the courts of general trial jurisdiction and the Public Prosecutor's Offices; however, they do not have any special powers as regards cybercrime. Related provisions: Exercise of criminal justice by courts: Jurisdiction in criminal matters is exercised by district courts, regional courts, high courts and the Supreme Court /1/16 REV 1 CN/ec 26

28 Exercise of criminal justice by Public Prosecutor's Offices: The Prosecutor's Offices are organised to mirror the organisation of the courts. Under Section 7 of Act No 283/1993 Coll. on the Public Prosecutor's Office: Seats and competence districts (1) The seats of the Public Prosecutor's Offices and their competence districts correspond to those of courts. (2) The Public Prosecutor's Office is responsible for representing the state in the court at which the Prosecutor's Office operates unless a special regulation stipulates otherwise. The Prosecutor's Office appears to have been actively involved in pooling expertise among prosecutors in CZ. It has set up a national network of cybercrime prosecutors (consisting of nearly 20 specialists), which has recently been 'formalised' by decision of all the chief public prosecutors. The team was informed that a national correspondent for cybercrime will also be added to the Eurojust National Coordination System. In addition, the team were provided with a copy of an opinion issued by the Supreme Prosecutor's Office (File No 1/2015) entitled 'Opinion unifying the interpretation of laws and other legal enactments regulating the issue of seizure of mobile phones and other data carriers, including the contents of s'. The team was also given a presentation on best practices in CZ when dealing with international cooperation in criminal matters. Reference was made to issues encountered by CZ as requested/executing country, when the requesting authority needed to send requests to several authorities in the same state. As a solution, national authorities referred to coordination meetings at Eurojust, the use of EJN, and the fact that ultimately CZ changed its system. In general, the outcome is that only one judicial authority (prosecutor's office in pre-trial proceedings, court in trial proceedings) is responsible for the execution of a MLA request, even if evidence has to be gathered in different districts in CZ. A template for a 'Model request for legal assistance consisting in requesting information on telecommunications traffic, including the contents of communication' with the USA was also handed out and presented. The form was drafted by the International Affairs Department of the Prosecutor's Office and competent US authorities /1/16 REV 1 CN/ec 27

29 4.1.2 Capacity for and obstacles to successful prosecution The Czech government has adopted the National Cyber Security Strategy for the period One of its priorities is to strengthen cooperation between the law-enforcement authorities and other entities involved in ensuring cyber-security in the Czech Republic. Existing structures and processes of cooperation in the area of combating cybercrime are being strengthened. The increase in cybercrime, threats and risks associated with the use of social networks on the internet is noted. The strategy expressly provides for and analyses in detail the ability to support the development of the Czech police to investigate and prosecute cybercrime. On the basis of the main goals of this strategy, a detailed Action Plan that defines concrete steps and deadlines for their implementation and monitoring was drawn up. As part of the annual Report on the State of Cyber Security in the Czech Republic, a report on the state of the implementation of the Action Plan is envisaged, in the form of an annex. The report will inform the government and the general public about the effectiveness of measures adopted and the implementation of tasks defined by the Strategy. Currently, a reorganisation of the Department of Information Crime, formerly under the Police Presidium is taking place, with the aim of enhancing the capability to combat and prevent cybercrime. The Department of Information Crime was moved under the Unit for Combating Organised Crime of the Criminal Police and Investigation Service on 1 October Another new department, Department of Cybercrime Investigation and Analysis (V8), within this unit was be established on 1 January 2016, whose aim will be to detect and investigate the most serious crimes in the area of cybercrime. The focus of the Department of Information Crime will then be the development of methodology and support activities to regions; its role as the focal point for international cooperation in this area will continue /1/16 REV 1 CN/ec 28

10025/16 MP/mj 1 DG D 2B

10025/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10025/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 COUNCIL OF THE EUROPEAN UNION Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150 NOTE from : Presidency to : Working Party on Police Cooperation No. prev. doc.: 11784/08

More information

10007/16 MP/mj 1 DG D 2B

10007/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

The commission communication "towards a general policy on the fight against cyber crime"

The commission communication towards a general policy on the fight against cyber crime MEMO/07/199 Brussels, 22 May 2007 The commission communication "towards a general policy on the fight against cyber crime" The use of the term cyber crime in this communication There is no agreed definition

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

6056/17 MK/ec 1 DG D 2B

6056/17 MK/ec 1 DG D 2B Council of the European Union Brussels, 8 February 2017 (OR. en) 6056/17 OUTCOME OF PROCEEDINGS From: On: 20 January 2017 To: Subject: General Secretariat of the Council Horizontal Working Party on Cyber

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38

More information

13268/16 EB/dk 1 DGD 1C

13268/16 EB/dk 1 DGD 1C Council of the European Union Brussels, 17 October 2016 (OR. en) 13268/16 OUTCOME OF PROCEEDINGS From: On: 13 October 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 12583/16 Subject:

More information

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security UN General Assembly Resolution 68/243 GEORGIA General appreciation of the issues of information security Widely publicized cyber attacks and, to some expert opinions, cyber war - conducted against Georgia

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Delegations will find attached the declassified version of the above document.

Delegations will find attached the declassified version of the above document. Council of the European Union Brussels, 8 February 2017 (OR. en) 14584/1/16 REV 1 DCL 1 GENVAL 119 CYBER 132 DECLASSIFICATION of document: dated: 31 January 2017 new status: Subject: 14584/1/16 REV 1 RESTREINT

More information

Commonwealth Cyber Declaration

Commonwealth Cyber Declaration Commonwealth Cyber Declaration Recognising that the development of cyberspace has made a powerful contribution to the economic, social, cultural and political life of the Commonwealth; Underlining that

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

Delegations will find attached the declassified version of the above document.

Delegations will find attached the declassified version of the above document. Council of the European Union Brussels, 28 July 2017 (OR. en) 8188/1/17 REV 1 DCL 1 GENVAL 42 CYBER 57 DECLASSIFICATION of document: dated: 18 May 2017 new status: Subject: 8188/1/17 REV 1 RESTREINT UE/EU

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

G8 Lyon-Roma Group High Tech Crime Subgroup

G8 Lyon-Roma Group High Tech Crime Subgroup G8 Lyon-Roma Group High Tech Crime Subgroup In October 2009, a series of recommendations for amendments to ICANN s Registrar Accreditation Agreement (RAA) was proposed to ICANN by law enforcement agencies

More information

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 - NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders

More information

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood Project concept 1 Version 1 July 2017 Project title / number (2017/DG1/JP/3692): CyberSouth Cooperation on cybercrime in the Southern

More information

Issue I. Airport Communication Project

Issue I. Airport Communication Project Issue I Airport Communication Project Recommendation 1 Governments are encouraged to continue their financial and technical support to the Airport Communication Project (AIRCOP) of the United Nations Office

More information

12711/17 GG/ec 1 DGD2B

12711/17 GG/ec 1 DGD2B Council of the European Union Brussels, 2 October 2017 (OR. en) 12711/17 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 9986/2/17 REV 2 Subject: GENVAL 79 CYBER 136 CATS 98

More information

Council of the European Union Brussels, 16 March 2015 (OR. en)

Council of the European Union Brussels, 16 March 2015 (OR. en) Conseil UE Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE PUBLIC JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational

More information

Overview on the Project achievements

Overview on the Project achievements Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia

More information

RESOLUTION 67 (Rev. Buenos Aires, 2017)

RESOLUTION 67 (Rev. Buenos Aires, 2017) 524 Res. 67 RESOLUTION 67 (Rev. Buenos Aires, 2017) The role of the ITU Telecommunication Development Sector in child online protection The World Telecommunication Development Conference (Buenos Aires,

More information

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection 402 Res. 179 RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution

More information

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution 67 (Rev. Dubai,

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

Council of the European Union Brussels, 23 November 2016 (OR. en)

Council of the European Union Brussels, 23 November 2016 (OR. en) Conseil UE Council of the European Union Brussels, 23 November 2016 (OR. en) 13323/1/16 REV 1 LIMITE PUBLIC DAPIX 173 ENFOPOL 349 ENFOCUSTOM 163 COSI 156 GENVAL 107 AVIATION 210 NOTE From: To: Subject:

More information

EU policy on Network and Information Security & Critical Information Infrastructures Protection

EU policy on Network and Information Security & Critical Information Infrastructures Protection EU policy on Network and Information Security & Critical Information Infrastructures Protection Köln, 10 March 2011 Valérie ANDRIANAVALY European Commission Directorate General Information Society and

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV OTHER MINISTERS OR ATTORNEYS GENERAL CIBER-VIII/doc.1/11 OF THE AMERICAS 6 November 2013 Original: English Eighth Meeting of the Working Group on Cyber-crime

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC UNODC is mandated to assist Member States in their struggle against illicit drugs, crime

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

UNODC. International Cooperation and Assistance in Cybercrime Matters

UNODC. International Cooperation and Assistance in Cybercrime Matters UNODC International Cooperation and Assistance in Cybercrime Matters UNODC Approach To integrate cybercrime and electronic evidence related issues in broader UNODC mandates of Supporting Member States

More information

Cyber Intel within European Cybercrime Center Ops

Cyber Intel within European Cybercrime Center Ops @EC3Europol ENISA CTI-EU Cyber Intel within European Cybercrime Center Ops Álvaro Azofra EC3 Operations Rome, 30 Oct 2017. SUMMARY 1. Europol 2. European Cybercrime Center (EC3) 3. EC3 Operations 4. EC3

More information

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 45 (Rev. Hyderabad, 2010) 212 RESOLUTION 45 (Rev. Hyderabad, 2010) The World Telecommunication Development Conference (Hyderabad, 2010), recalling a) Resolution 45 (Doha, 2006) of the World Telecommunication Development Conference

More information

Project III Public/private cooperation

Project III Public/private cooperation Project Cybercrime@EAP III Public/private cooperation Արևելյան Գործընկերություն Східне партнерство Eastern Partnership აღმოსავლეთ პარტნიორობა Parteneriatul Estic Şərq tərəfdaşlığı Partenariat Oriental

More information

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA Executive summary of the public audit report THE CYBER SECURITY ENVIRONMENT IN LITHUANIA 9 December 2015, No. VA-P-90-4-16 Full audit report in Lithuanian is available on the website of the National Audit

More information

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level? 1. Which specific challenges need to be tackled by EU action in the coming five years regarding international crime, radicalisation and terrorism, cybercrime and cyber-attacks, natural and man-made disasters?

More information

Delegations will find attached the declassified version of the above document.

Delegations will find attached the declassified version of the above document. Council of the European Union Brussels, 12 August 2016 (OR. en) 9892/1/16 REV 1 DCL 1 GENVAL 67 CYBER 63 DECLASSIFICATION of document: 9892/1/16 REV 1 dated: 15 July 2016 new status: Subject: Public Evaluation

More information

Global Wildlife Cybercrime Action Plan1

Global Wildlife Cybercrime Action Plan1 Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.

More information

PROJECT RESULTS Summary

PROJECT RESULTS Summary Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator

Request for Expression of Interest. Consultant - Project Coordinator. Project: I-CARE Global Imperative Indicator Request for Expression of Interest Consultant - Project Coordinator Project: I-CARE Global Imperative Indicator Unidentified Victims Portrayed on Child Abuse Images Organisational Background ECPAT International

More information

14965/17 MK/ec 1 DG D 2B

14965/17 MK/ec 1 DG D 2B Council of the Union Brussels, 4 December 2017 (OR. en) 14965/17 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 14435/17 + COR 1 CYBER 190 TELECOM 320 FOPOL 576 JAI 1116 MI

More information

etning_2015_web.pdf

etning_2015_web.pdf DPA: Datatilsynet (Denmark) TITLE: Datatilsynets årsberetning 2015 DATE: July 2016 KEY WORDS: annual report, international cooperation WEBSITE LINK: https://www.datatilsynet.dk/fileadmin/user_upload/dokumenter/aarsberetninger/datatilsynets_arsber

More information

MOTION FOR A RESOLUTION

MOTION FOR A RESOLUTION European Parliament 2014-2019 Plenary sitting B8-0155/2019 6.3.2019 MOTION FOR A RESOLUTION to wind up the debate on the statements by the Council and the Commission pursuant to Rule 123(2) of the Rules

More information

12002/1/18 REV 1 PhL/at 1 ECOMP. 3 B

12002/1/18 REV 1 PhL/at 1 ECOMP. 3 B Council of the European Union Brussels, 24 September 2018 (OR. en) 12002/1/18 REV 1 UD 192 PI 120 NOTE From: To: General Secretariat of the Council Delegations No. prev. doc.: ST 10644/2/18 REV 2 Subject:

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

STATEMENT OF STRATEGY

STATEMENT OF STRATEGY STATEMENT OF STRATEGY 2014-2016 OUR MISSION OUR MANDATE ANALYSIS OF OUR ENVIRONMENT Opportunities Challenges HIGH-LEVEL GOALS STRATEGIES PERFORMANCE INDICATORS Our Mission To protect the individual s right

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014 OUR MANDATE O The EFCC is the agency charged with the responsibility for the enforcement

More information

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats Workshop on Cyber Security & Cyber Crime Policies Policies for African Diplomats ROLE OF INTERPOL IN FIGHTING CYBERCRIME IN AFRICA SRIAU Office Augusto de CARVALHO 12-13 APRIL 2018 ADDIS ABABA OVERVIEW

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Cybersecurity Strategy of the Republic of Cyprus

Cybersecurity Strategy of the Republic of Cyprus Cybersecurity Strategy of the Republic of Cyprus George Michaelides Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy 12 th February 2016 Cybersecurity Strategy of

More information

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt

QUESTIONNAIRE. Submission Information. Information for follow-up purposes. 21 Abdelaziz Al Saud,Manyal El Roda, Cairo, Egypt Implementation of the recommendations adopted by the Fifty-first session of the Subcommission on Illicit Drug Traffic and Related Matters in the Near and Middle East, held in Riyadh from 20 to 24 November

More information

ITU Model Cybercrime Law: Project Overview

ITU Model Cybercrime Law: Project Overview ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Development of a renewed European Union Internal Security Strategy. Justice and Home affairs Council meeting Brussels, 4 December 2014

Development of a renewed European Union Internal Security Strategy. Justice and Home affairs Council meeting Brussels, 4 December 2014 Council of the European Union PRESS EN COUNCIL CONCLUSIONS Brussels, 4 December 2014 Development of a renewed European Union Internal Security Strategy Justice and Home affairs Council meeting Brussels,

More information

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice 1 Netherlands: small country, big time vulnerable #1 80% online banking 95% youth uses

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a

More information

DRAFT PROGRAMME. Exchange of views with experts on the fight against Cybercrime

DRAFT PROGRAMME. Exchange of views with experts on the fight against Cybercrime European Parliament 2014-2019 Committee on Civil Liberties, Justice and Home Affairs LIBE(2017)0424_1 DRAFT PROGRAMME Exchange of views with experts on the fight against Cybercrime Monday, 24 April 2017

More information

Policy recommendations. Technology fraud and online exploitation

Policy recommendations. Technology fraud and online exploitation Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

This report was prepared by the Information Commissioner s Office, United Kingdom (hereafter UK ICO ).

This report was prepared by the Information Commissioner s Office, United Kingdom (hereafter UK ICO ). REPORT TO THE 38 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS - MOROCCO, OCTOBER 2016 ON THE 5 th ANNUAL INTERNATIONAL ENFORCEMENT COOPERATION MEETING HELD IN MANCHESTER, UK,

More information

15670/14 EB/hm 1 DG D 1 C

15670/14 EB/hm 1 DG D 1 C Council of the European Union Brussels, 19 November 2014 (OR. en) 15670/14 JAI 895 "I/A" ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 14186/6/14 REV 6 Subject: Permanent Representatives

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1 Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance,

More information

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3 Andrea.Servida@ec.europa.eu What is at stake with CIIs The World Economic Forum

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EUROPEAN COMMISSION Brussels, 13.9.2017 C(2017) 6100 final COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity Incidents and Crises EN EN COMMISSION RECOMMENDATION

More information

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department Data Protection System of Georgia Nina Sarishvili Head of International Relations Department 14/12/2016 Legal Framework INTERNATIONAL INSTRUMENTS CoE 108 Convention AP on Supervisory Authorities and Trans-

More information

ASEAN s Cyber Confidence Building Measures

ASEAN s Cyber Confidence Building Measures ASEAN s Cyber Confidence Building Measures Presentation by the ASEAN Secretariat UNIDIR Cyber Stability Seminar: Preventing Cyber Conflict 10 February 2014, Geneva, Switzerland Outline ASEAN Mechanisms

More information

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012 CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,

More information

UNODC/CCPCJ/EG.4/2017/CRP.1

UNODC/CCPCJ/EG.4/2017/CRP.1 3 April 2017 English only Expert Group to Conduct a Comprehensive Study on Cybercrime Vienna, 10-13 April 2017 Information on the implementation of Crime Commission resolution 22/8 Note by the Secretariat

More information

OPINION ON THE DEVELOPMENT OF SIS II

OPINION ON THE DEVELOPMENT OF SIS II OPINION ON THE DEVELOPMENT OF SIS II 1 Introduction In an attempt to ensure that the second-generation Schengen information system SIS II complies with the highest standards of data protection, the Joint

More information

Intellectual Property Office of Serbia

Intellectual Property Office of Serbia Intellectual Property Office of Serbia Country Report WIPO Regional Conference Development of National IP Strategy Sibiu, June 21 to 22, 2012 Intellectual Property Office Serbia has a long tradition in

More information

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) (CFI-12-IGCI-02) Background INTERPOL recognizes that police worldwide

More information

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects

ILLICIT GOODS AND GLOBAL HEALTH. Future-oriented policing projects ILLICIT GOODS AND GLOBAL HEALTH Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

10496/18 MC/sl 1 DGD 2

10496/18 MC/sl 1 DGD 2 Council of the European Union Brussels, 26 June 2018 (OR. en) 10496/18 OUTCOME OF PROCEEDINGS From: On: 26 June 2018 To: General Secretariat of the Council Delegations No. prev. doc.: 10072/18 Subject:

More information

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association page 1 Cybersecurity Strategy Essential Points The norms, principles and values that the City of Vienna and the

More information

16474/08 JJ/ap 1 DGH4

16474/08 JJ/ap 1 DGH4 COUNCIL OF THE EUROPEAN UNION Brussels, 28 November 2008 16474/08 PROCIV 185 COCON 40 COSDP 1097 DEVGEN 255 ENV 912 FORETS 74 ONU 105 RECH 396 RELEX 969 SAN 300 TELECOM 212 NOTE from : Council Secretariat

More information

A comprehensive approach on personal data protection in the European Union

A comprehensive approach on personal data protection in the European Union A comprehensive approach on personal data protection in the Justice Date 1 Main legal instruments on EU level Data Protection Directive 95/46/EC Directive 2002/58/EC on privacy and electronic communications

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information